On Sun, Nov 04, 2012 at 02:51:32AM +0100, Erwin Schliske wrote:

> Hello,
> 
> I've now updated my gateways to 5.2 and have tested again.
> 
> If I start isakmpd in foreground mode with
> 
> isakmpd -K -d -S
> 
> and sasyncd in foreground mode with
> 
> sasyncd -d -v
> 
> and this sasyncd.conf
> 
> peer x.x.x.x
> interface carp0
> control isakmpd
> sharedkey xxxxxxxxxxxxxxx
> 
> the tunnel never comes up. isakmpd stays in passive mode, even the output 
> from sasyncd says that it is the master.
> 
> If I start isakmpd with
> 
> isakmpd -K -d
> 
> the tunnel comes up in seconds.
> 
> 
> Any idea?

I think you already got a hint from mikeb.

http://marc.info/?l=openbsd-misc&m=135144572426640&w=2

        -Otto
        

> 
> 
> Regards,
> Erwin
> 
> 
> > Hello,
> > 
> > Thanks for all responses. The hints like pinging not from gateway but from 
> > the network, debug mode and so on were checked by me before I sent the 
> > email to this list. Also is to mention that the tunnel which makes trouble 
> > is not the only one on the gateway. Other tunnels work without problems.
> > 
> > But now I have figured out what I have to change to bring up the tunnels 
> > after loading the config with ipsecctl.
> > 
> > I have to disable sasyncd, which if enabled causes to start isakmpd with 
> > parameter S. If isakmpd starts without this parameter the tunnels come up 
> > and work smoothly.
> > 
> > So the question. Is this a know behaviour, that isakmpd switches to passive 
> > if sasyncd is enabled? Or is this a bug?
> > 
> > 
> > Thanks.
> > 
> > Erwin
> > 
> > Am 02.10.2012 um 11:01 schrieb Janne Johansson <icepic...@gmail.com>:
> > 
> >> 2012/10/1 Erwin Schliske <erwin.schli...@sevenval.com>:
> >>> Hello,
> >>> 
> >>> I've set up an OpenBSD box as vpn gateway. The tunnel I have to establish 
> >>> is
> >>> with a Cisco ASA 5505, which is not under my administration.
> >>> 
> >>> Here is the ipsec.conf
> >>> 
> >>> ike esp from { 172.30.77.0/24, 10.70.0.0/24, 10.83.0.0/24, 10.77.4.0/24 } 
> >>> to {
> >>> 172.16.70.0/24, 172.16.71.0/24, 172.16.72.0/24 } \
> >>> peer a.b.102.219 \
> >>> local c.d.3.254 \
> >>> main auth hmac-sha1 enc 3des group modp1024 \
> >>> quick auth hmac-sha1 enc 3des group none \
> >>> psk password
> >>> 
> >>> If I try to ping one host on cisco side from OpenBSD side the tunnel 
> >>> doesn't
> >>> come up. If I look with tcpdump on the external interface or in the 
> >>> tcpdump
> >>> logging of isakmpd OpenBSD doesn't try to establish the tunnel. If I ping 
> >>> from
> >>> the Cisco side an host on OpenBSD side the tunnel comes up. In the 
> >>> logging of
> >>> isakmpd I see this loglines
> >> 
> >> "from the X side", does that mean you try to ping from the openbsd,
> >> OR, from one of the networks listed in the from-line?
> >> One of the common mistakes is to test from the ipsec-gw itself and not
> >> accounting for the fact that the ipsec.conf lines mostly are
> >> "to talk from net A to net B, host X will do ipsec to peer Y". In such
> >> a case, testing from host X will not go through the tunnel, since the
> >> rule is "from net A".
> >> Most of the time the host X has a leg on net A and can "ping -I
> >> my-ip-at-NetA dest-on-net-B" but not always.
> >> 
> >> Then again, since active esp is the default for ipsec.conf when you
> >> write "ike esp ...", it should start trying to set the tunnel up as
> >> soon as you load the rules, and not wait until packets want to
> >> traverse it.
> >> 
> >> -- 
> >> To our sweethearts and wives.  May they never meet. -- 19th century toast

Reply via email to